1 Requirements Management - II Lecture # 19. 2 Recap of Last Lecture We talked about requirements management and why is it necessary to manage requirements.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

Software change management
Configuration management
Software Quality Assurance Plan
Alternate Software Development Methodologies
Soft. Eng. II, Spr. 02Dr Driss Kettani, from I. Sommerville1 CSC-3325: Chapter 6 Title : The Software Quality Reading: I. Sommerville, Chap: 24.
Requirements Specification
Requirements Management
IS550: Software requirements engineering Dr. Azeddine Chikh 4. Validation and management.
Configuration Management
Chapter 25 – Configuration Management 1Chapter 25 Configuration management.
This chapter is extracted from Sommerville’s slides. Text book chapter
CS 4310: Software Engineering
Software Configuration Management (SCM)
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Requirements Engineering Processes l Processes used to discover, analyse and.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
 To explain the importance of software configuration management (CM)  To describe key CM activities namely CM planning, change management, version management.
1 Software Development Configuration management. \ 2 Software Configuration  Items that comprise all information produced as part of the software development.
Requirements Engineering CSE-305 Requirements Engineering Process Tasks Lecture-5.
Requirements Change Management
Configuration Management (CM)
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 29 Slide 1 Configuration management.
Creator: ACSession No: 16 Slide No: 1Reviewer: SS CSE300Advanced Software EngineeringFebruary 2006 (Software Quality) Configuration Management CSE300 Advanced.
Requirements Management. Learning outcome Explain why requirements management is important Explain reasons of requirements change.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
Configuration Management CSCI 5801: Software Engineering.
Requirements Engineering Requirements Engineering in Agile Methods Lecture-28.
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
Requirements Engineering Requirements Validation and Management Lecture-24.
Requirements Engineering Requirements Management Lecture-25.
Requirements Engineering Requirements Management Lecture-26.
 The processes used for RE vary widely depending on the application domain, the people involved and the organisation developing the requirements.  However,
Chapter 25 – Configuration Management 1Chapter 25 Configuration management.
Software Configuration Management
Software Project Configuration Management
Chapter 4 – Requirements Engineering
Prototyping Lecture # 08.
Requirements Validation – II
Chapter 11: Software Configuration Management
Requirements Engineering (continued)
Requirements Traceability
Requirements Traceability
Computer Aided Software Engineering (CASE)
Software Configuration Management
GO! with Microsoft Access 2016
THE STEPS TO MANAGE THE GRID
Design and Implementation
Configuration Management
FORMAL SYSTEM DEVELOPMENT METHODOLOGIES
Change Control Module P5 LEARNING OBJECTIVES: LEARNING OUTCOMES
Software Requirements analysis & specifications
Configuration management
Chapter 13 Quality Management
Chapter 25 – Configuration Management
Chapter 11: Software Configuration Management
Chapter 8 Software Evolution.
Lecture 06:Software Maintenance
Requirements Management - I
The ultimate in data organization
Requirements Traceability
Chapter 25 – Configuration Management
BCS Template Presentation February 22, 2018
Requirements Document
Configuration management
Requirements Validation – I
Requirements Analysis and Negotiation
Software Requirements
Software Requirements
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

1 Requirements Management - II Lecture # 19

2 Recap of Last Lecture We talked about requirements management and why is it necessary to manage requirements changes rather than disallow changes in requirements We’ll continue our discussion on requirements management today

3 Requirements Identification - 1 It is essential for requirements management that every requirement should have a unique identification The most common approach is requirements numbering based on chapter/section in the requirements document

4 Requirements Identification - 2 Problems with this are: –Numbers cannot be unambiguously assigned until the document is complete –Assigning chapter/section numbers is an implicit classification of the requirement. This can mislead readers of the document into thinking that the most important relationships are with the requirements in the same section

5 Requirements Identification Techniques Dynamic renumbering Database record identification Symbolic identification

6 Dynamic Renumbering Some word processing systems allow for automatic renumbering of paragraphs and the inclusion of cross-references. As you re- organize your document and add new requirements, the system keeps track of the cross-reference and automatically renumbers your requirement depending on its chapter, section and position within the section

7 Database Record Identification When a requirement is identified it is entered in a requirements database and a database record identifier is assigned. This database identifier is used in all subsequent references to the requirement

8 Symbolic Identification Requirements can be identified by giving them a symbolic name which is associated with the requirement itself. For example, EFF-1, EFF-2, EFF-3 may be used for requirements which relate to system efficiency

9 Storing Requirements Requirements have to be stored in such a way that they can be accessed easily and related to other system requirements

10 Requirements Storage Techniques In one or more word processor files In a specially designed requirements database

11 Word Processor Documents: Advantages Requirements are all stored in the same place Requirements may be accessed by anyone with the right word processor It is easy to produce the final requirements document

12 Word Processor Documents: Disadvantages - 1 Requirements dependencies must be externally maintained Search facilities are limited Not possible to link requirements with proposed requirements changes

13 Word Processor Documents: Disadvantages - 2 Not possible to have version control on individual requirements No automated navigation from one requirement to another

14 Requirements Database - 1 Each requirement is represented as one or more database entities Database query language is used to access requirements

15 Requirements Database: Advantages Good query and navigation facilities Support for change and version management

16 Requirements Database: Disadvantages Readers may not have the software/skills to access the requirements database The link between the database and the requirements document must be maintained

17 Requirements Database Choice Factors - 1 The statement of requirements The number of requirements Teamwork, team distribution and computer support CASE tool use Existing database usage

18 Requirements DB - Choice Factors - 1 The statement of requirements –If there is a need to store more than just simple text, a database with multimedia capabilities may have to be used The number of requirements –Larger systems usually need a database which is designed to manage a very large volume of data running on a specialized database server

19 Requirements DB - Choice Factors - 2 Teamwork, team distribution and computer support –If the requirements are developed by a distributed team of people, perhaps from different organizations, you need a database which provides for remote, multi-site access

20 Requirements DB - Choice Factors - 3 CASE tool use –The database should be the same as or compatible with CASE tool databases. However, this can be a problem with some CASE tools which use their own proprietary database Existing database usage –If a database for software engineering support is already in use, this should be used for requirements management

21 Change Management Change management is concerned with the procedures, processes and standards which are used to manage changes to system requirements Without formal change management, it is impossible to ensure that proposed changes support business goals

22 Change Management Policies - 1 The change request process and the information required to process each change request The process used to analyze the impact and costs of change and the associated traceability information

23 Change Management Policies - 2 The membership of the body which formally considers change requests The software support (if any) for the change control process

24 Change Management Stages Problem analysis and change specification Change analysis and costing Change implementation Identified problem Revised requirements

25 Problem Analysis and Change Specification Some requirements problem is identified This could come from an analysis of the requirements, new customer needs, or operational problems with the system. The requirements are analyzed using problem information and requirements changes are proposed

26 Change Analysis and Costing This checks how many requirements (and, if necessary, system components) are affected by the change and roughly how much it would cost, in both time and money, to make the change

27 Change Implementation A set of amendments to the requirements document or a new document version is produced. This should, of course, be validated using whatever normal quality checking procedures are used

28 Change Analysis and Costing Process Check request validity Find directly affected requirements Find dependent Propose requirements changes Assess costs of change Assess costs acceptability Requirements change list Change request Rejected request Valid request Req. list Rejected request Rejected request Accepted changes Cost info Cost info Requirements changes Customer information Customer information

29 Change Analysis Activities - 1 The change request is checked for validity. Customers can misunderstand requirements and suggest unnecessary changes The requirements which are directly affected by the change are discovered Traceability information is used to find dependent requirements affected by the change

30 Change Analysis Activities - 2 The actual changes which must be made to the requirements are proposed The costs of making the changes are estimated. Negotiations with customers are held to check if the costs of the proposed changes are acceptable

31 Change Request Rejection Reasons - 1 If the change request is invalid. This normally arises if a customer has misunderstood something about the requirements and proposed a change which isn’t necessary

32 Change Request Rejection Reasons - 2 If the change request results in consequential changes which are unacceptable to the user. If the cost of implementing the change is too high or takes too long

33 Change Processing Proposed changes are usually recorded on a change request form which is then passed to all of the people involved in the analysis of the change. It may include –Fields to document the change analysis –Data fields –Responsibility fields –Status field –Comments field

34 Tool Support for Change Management May be provided through requirements management tools or through configuration management tools

35 Tools Features - 1 Electronic change request forms which are filled in by different participants in the process A database to store and manage these forms A change model which may be instantiated so that people responsible for one stage of the process know who is responsible for the next process activity

36 Tools Features - 2 Electronic transfer of forms between people with different responsibilities and electronic mail notification when activities have been completed In some cases, direct links to a requirements database

37 Summary - 1 Requirements management requires that each requirement should be uniquely identified If a large number of requirements have to be managed, the requirements should be stored in a database and links between related requirements should be maintained

38 Summary - 2 Change management policies define the processes used for change management and necessary information Automated support for change management should come through specialized requirements management tools or by configuring existing tools to support change management

39 References Software Engineering: A Practitioner’s Approach by Roger S. Pressman ‘Requirements Engineering: Processes and Techniques’ by G. Kotonya and I. Sommerville, John Wiley & Sons, 1998